Search Results for "" cyber ""
Not finding what you’re looking for?
10 of 3691 Results
The Virtual Cybersecurity Frontier
It’s no exaggeration to say the networking industry is going through a period of near-unprecedented change. The rapid adoption of software defined network (SDN) concepts and network functions virtualization (NFV) by global telecommunications service providers will continue to drive the rapid evolution and standardization, writes Bob Kimball, CTO for Ciena Government Solutions.
Image

Budgetary Concerns Dominate Pacific Pivot
Declining defense funds and the rise of China may hinder strategic rebalancing efforts.
Taking the First Steps for Privileged Access Management
Assessing what’s on a network helps with security audits.
Image

Small Businesses Need Big Cybersecurity
Limited resources should not prevent systems, data protection.
Image

BIG DATA IS CRITICAL TO THE DOD SCIENCE AND TECHNOLOGY INVESTMENT AGENDA
The Secretary of Defense signed a memorandum on 19 April 2011 which articulates the Science and Technology (S&T) priorities for the Department of Defense (DoD). This memo flows from extensive planning including reviews of all defense missions and architectures to support those missions. The result: seven S&T priorities have been identified for strategic investment. These [...]
Commerce Department to Lead Cybersecurity Trade Delegation
Twenty companies will participate in a trade mission with Romania and Poland.
Strategies for Pursuing Diversity in Cybersecurity and IT
Cyber, signal and information technology experts offer approaches for inclusivity in these crucial fields.
Image
Event eNews Websites Deliver Conference Benefits to You
To help government and industry connect, network and learn about requirements and solutions, SIGNAL Media offers Event eNews websites for several major AFCEA International events that feature near real-time coverage as well as daily wrap-ups of speakers and panel discussions.
Quantum Information Science Matters
An Air Force lab advances capabilities to improve fundamental operations.
Image

You (WE) Are the Weakest Link
Yet you (we) can be the strongest force for cybersecurity.